InvestorsHub Logo
Followers 1
Posts 173
Boards Moderated 0
Alias Born 09/28/2012

Re: None

Wednesday, 11/01/2017 11:08:06 AM

Wednesday, November 01, 2017 11:08:06 AM

Post# of 235027
More like superman


Your question? Quote:

Transmission of a one-time password (OTP) to a smartphone has traditionally been considered an effective out-of-band method. However, if the same phone is then used to submit the OTP— for example, via a web browser—the effectiveness of the OTP as a secondary factor is effectively nullified.

I think the answer is?

Once the user has been verified, the security computer establishes an “out- of-band” communication channel with the user via a different authentication channel (e.g., by calling the user’s mobile phone over a cellular network). Id. Using that second authentication channel, the user provides additional information that is used to authenticate the user for access."


In reality the problem in your assessment is that you are only looking at one source being used as a smart phone and not a computer! The concept being two different types of sources must be used and not one as you suggested being a phone only as you surmised !

I can't play in your Tech arena as you work for a software based company WBC, but it looks to me that the answer is nullified by the above.

But lets remember its a patent play!